New Threat Hunting Blog -- Malware of the Day – Tunneling RDP with Microsoft Dev Tunnels
Active Countermeasures
Creators of AC-Hunter & RITA Network Threat Hunting Software -- Threat Hunting Simplified!
Hey Folks!
We just added a new -- Malware of the Day – Tunneling RDP with Microsoft Dev Tunnels -- blog entry to our Active Countermeasures website:
Read: https://www.activecountermeasures.com/malware-of-the-day-tunneling-rdp-with-microsoft-dev-tunnels/
Malware of the Day Mission
To identify and share examples of post-compromise network activity in order to better detect and respond to potential network threats. Specifically we are looking for command and control (C2) communication channels used by attackers to obtain intelligence, issue commands, and exfiltrate data through a compromised host or hosts.
A Link to the Entire Series:
Fireside Fridays - Linux Terminal
These virtual live sessions will be a combination of lectures and hands-on labs. We'll cover a single topic and hopefully fill in some of those cracks.
Think of it as a single focused "ask us anything" session.
No judgment on the questions that get asked, just a chance to raise the bar for all of us.
It all comes down to common sense.
1 个月You're the best. Thank you!
This article is a great breakdown of the emerging threat of tunneling RDP using Microsoft Dev Tunnels. It's eye-opening to see how attackers continuously find ways to repurpose legitimate tools for malicious intent. The 'Malware of the Day' series is such a valuable resource for security professionals to stay ahead of the curve. I appreciate how the article dives into post-compromise detection strategies and highlights the importance of identifying these C2 communication channels. I'll definitely be exploring more articles in this series. Looking forward to attending the Fireside Fridays sessions as well - hands-on labs and open discussions are a fantastic way to bridge the knowledge gap. Kudos to Active Countermeasures for these initiatives!